CVE Vulnerabilities

CVE-2014-0017

Published: Mar 14, 2014 | Modified: Mar 26, 2014
CVSS 3.x
N/A
Source:
NVD
CVSS 2.x
1.9 LOW
AV:L/AC:M/Au:N/C:P/I:N/A:N
RedHat/V2
4.3 MODERATE
AV:N/AC:M/Au:N/C:P/I:N/A:N
RedHat/V3
Ubuntu
MEDIUM

The RAND_bytes function in libssh before 0.6.3, when forking is enabled, does not properly reset the state of the OpenSSL pseudo-random number generator (PRNG), which causes the state to be shared between children processes and allows local users to obtain sensitive information by leveraging a pid collision.

Affected Software

Name Vendor Start Version End Version
Libssh Libssh * 0.6.2 (including)
Libssh Libssh 0.4.7 (including) 0.4.7 (including)
Libssh Libssh 0.4.8 (including) 0.4.8 (including)
Libssh Libssh 0.5.0 (including) 0.5.0 (including)
Libssh Libssh 0.5.0-rc1 (including) 0.5.0-rc1 (including)
Libssh Libssh 0.5.1 (including) 0.5.1 (including)
Libssh Libssh 0.5.2 (including) 0.5.2 (including)
Libssh Libssh 0.5.3 (including) 0.5.3 (including)
Libssh Libssh 0.5.4 (including) 0.5.4 (including)
Libssh Libssh 0.5.5 (including) 0.5.5 (including)
Libssh Libssh 0.6.0 (including) 0.6.0 (including)
Libssh Libssh 0.6.1 (including) 0.6.1 (including)
Libssh Ubuntu devel *
Libssh Ubuntu lucid *
Libssh Ubuntu precise *
Libssh Ubuntu quantal *
Libssh Ubuntu saucy *
Libssh Ubuntu upstream *

References